Analysis
-
max time kernel
144s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2023 00:00
Static task
static1
Behavioral task
behavioral1
Sample
20e3a7868988f5bbe5cfed7ff0866a33.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
20e3a7868988f5bbe5cfed7ff0866a33.exe
Resource
win10v2004-20231215-en
General
-
Target
20e3a7868988f5bbe5cfed7ff0866a33.exe
-
Size
385KB
-
MD5
20e3a7868988f5bbe5cfed7ff0866a33
-
SHA1
ef898e9a26faab84a0ce9ec9345c69078e16912e
-
SHA256
cb62017cb1c3bbb4b90bb22ba14625a9858808e7919ae68f54f395acfd8513db
-
SHA512
9bc166dba02ca6ee587a2ede1b6f1b378e156da8ef78476db2976f35c9b57d1040b3f97738a0a5bbbe0ead6ab6b4a19e42b3a555f3db15824abf31997c59f9f6
-
SSDEEP
12288:NmCAt8emUQWQbFjHaz40qsW2/eJyXrsDB:amU5Qd6DTW2N7sDB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 220 20e3a7868988f5bbe5cfed7ff0866a33.exe -
Executes dropped EXE 1 IoCs
pid Process 220 20e3a7868988f5bbe5cfed7ff0866a33.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1292 20e3a7868988f5bbe5cfed7ff0866a33.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1292 20e3a7868988f5bbe5cfed7ff0866a33.exe 220 20e3a7868988f5bbe5cfed7ff0866a33.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1292 wrote to memory of 220 1292 20e3a7868988f5bbe5cfed7ff0866a33.exe 88 PID 1292 wrote to memory of 220 1292 20e3a7868988f5bbe5cfed7ff0866a33.exe 88 PID 1292 wrote to memory of 220 1292 20e3a7868988f5bbe5cfed7ff0866a33.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\20e3a7868988f5bbe5cfed7ff0866a33.exe"C:\Users\Admin\AppData\Local\Temp\20e3a7868988f5bbe5cfed7ff0866a33.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Users\Admin\AppData\Local\Temp\20e3a7868988f5bbe5cfed7ff0866a33.exeC:\Users\Admin\AppData\Local\Temp\20e3a7868988f5bbe5cfed7ff0866a33.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:220
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD51e5190234633bab991b6851942ec6c2f
SHA169d7fc483f5c33a5ab0e529e60452b6266622e3c
SHA256e2cb94e66cc1c86fee5f1f604bdf21282af42dde3091cdcdda7343eb36996ab3
SHA512ab560ac9e3901c52a99cb7933f75b761ff6734729d18f9e8a7e2bb1464f05d7277b069c78009b2cc6f53fffb826f871c8adf62190c80207fcbf45c444d58f2ba